Students
(C) = Capstone, (T) = Thesis
Capstone/Thesis Advisor: (Finished)
2021
- Kunal Joshi, “Navigation System using Outdoor Object Detections & Recognitions for People who are Blind & Visually Impaired using Deep Learning.”
- Tulasi Amaraneni, “E-commerce Recommendation System.”
- Bharath Kumar Reddy Ralgari, “Implementing a Serverless Architecture for Data Analytics using AWS.”
- Trung Khuong, “IoT Statistic and Analytics of Networking Traffic Data on AWS IoT Cloud Core”.
- Sahil Shah, “Spotify Recommendation System and Analysis Dashboard form 1925-2021.”
- Dylan Dias, “Global Climate Change Dashboard.”
- Jonathan Pereira, “Anchor Self-Calibrating Schemes for UWB based Indoor Localization.”
- Ankit Jadhav, “Implementing Analytics to Evaluate Network System”.
2020
- Annesha Talukdar, “IoT Malware Detection and Analysis”.
- Athanasios Babsidis, “Information Systems Security Readiness Visualization Tool”.
- Kwame Compton, “Disaster Recovery Failover Environment Using AWS”.
- Neha Mittoor Changappa “An Integrated Social Media Analysis and Business Listing Platform for Marketing Cloud Agencies”.
- Gage LaFleur, “An Assessment Tool for Analysis of IoT Security in the Home”.
- William Crowe, ”Machine to Machine Ad Hoc Networking with a Redundant 4G LTE Gateway”.
2019
- Krishan Teja Patchamatia, “Attacks on IoT Deveices”.
- Sindhura Meka, “ERP for Small Business.”
- Annesah Basude Talukdar, “IoT Malware Detection and Analysis.”
- Manu Suresh, “Dynamic Sensor Orientation Unit for Intelligent Mobility Cane.”
- Steve Forney, “User Experience in Sign Language Recognition.”
- Shreya Thacker, “Application for Borrower’s Credit Capacity.”
- Poorveen Tailor,”Enterprise Network Solution using Aruba Products.”
2018
- Bharat Biyani,“Configuration, Evaluation and Performance Testing of First Hop Network Redundancy Protocols.”
- Shriyan Mithun, “Improving Autonomous System Security for BGP Networks.”
- Saravana Murugesh Kumar, “Building a Distributed Data Processing Server with Hazard Detection for a Real-Time Package Monitoring System.”
- Li Liu, “WebRTC Real-Time Communication and Synchronous Whiteboard of the Web”.
- Ravi Theja Lingam, “Achieving High Availability Networks Using VRRP”.
- Venkata Sai Saaketh Nistala, “Mitigation Techniques for Layer 2 and 3 Attacks”.
- Ankit Mujumdar, “Smart Home Evaluation with IoT Devices.”
- Harold Chelchowski, “Increasing Cybersecurity Awareness via a Windows Web Security Application”.
2017
- Ashish Heda, “Developing IoT Labs using Wireless Sensor Networks.”
- Adrian Pinder, “Hashed QR Codes for a Cost Effective Automated Motor Vehicle Licensing System.”
- Mohammed Alsaimi, “An Efficient IP Lookup Mechanism for Classless Inter-Domain Routing Using Radix-Trie.”
2016
- Kevin Yip : Utiliing Splunk Across An IT Enterprise Operations.
- Osama AlQahtani, Improving Network Security for Jazan University.
- Rebecca Gibbon, Performance Testing for Physical and Cloud File Servers at Rochester Institute of Technology.
- Khalid Jarrah, Merging Wireless Sensor Networks in Lab Practice.
- Haward Rodriguez, Policy System Administration in IP Networks: A Global Correlation Problem.
- Alexander Rodriguez, Assessing Performance on DO ccTLD Name Servers.
- Suyash Jadhav, Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning.
2015
- Khalid Almatrafi, Studying the Effects of Using an Electronic Learning Management System on the Royal Saudi Naval Forces Network using OPNET Technology.
- Haitham Alghmdi, Design & Performance Evaluation of SDL network connected to IPS in Saudi Arabia via OPNET tools.
- Naif AlAslani, Cloud and Student Information Records:Design & Evaluate the performance for national institute of technology (NIT) in Saudi Arabia by Opnet Tool.
- Khaled Algarni, Information Security Policy for e-Government in Saudi Arabia (effectiveness-vulnerabilities-threats).
- Kriti Sharma, Designing a course-Enterprise Mobile.
- Sahil Bhola, Evaluation of Mobile Device Security Policies.
- Seung Kim, Dell KACE client deployjment:end-to-end system.
2014
- Abdulaziz Alshuwaier, Evaluation of Firewall Effects on Cloud Computing Performance.
- Ameen Almoqhim, Improving Performance of Multi-Segment Transport Protocol and Sensor Transmission Control Protocol.
- Almogari Mshari, Performance Comparison between OLSR & AODV using the System in-the Loop(SITL) Simulation from OPNET.
- Trad Albalawi, Addressing Saudi SMEÕs Cloud Security Issues.
- Eid Abdulaziz, Redesigning & Expanding the IPA Optial Intranet Using OPNET SP Guru Transport Planner.
- Aamir Khalid A Ahmadhussain, Smart Home for Deaf by using iPhone Application with Bluetooth & Wireless Network
- Sullman, Alotaibi, Managing & Securing Personal Devices-Auditing ChecklistsSecure Design & Implementation of Videoconference Networking for the Royal Saudi Navy Force (RSNF)
- Rainer Campillo, A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network.
- Juan Salcedo,
- Bhavin Desai, ISTA Test Selection Tool Network Modeling & Analysis Labs Using Opnet.
- Ishita Metha, Modeling & Simulation Las of Manet Using OPNET.
2013
- Amit Umarye, Proactive Resource Monitoring.
- Rajath Chouta, Controlled Environmental Study of a Standalone Computer Incorporating Arrhenius’ Equations.
- Mohammad Zamzami, Cloud based eHR system: Design and analyze the performance using OPNET tool for the kingdom of Saudi Arabia.
- , Malviya, Esha, Monitoring System Website Design.
- John Gustafson, Comparing Application Latency Using Virtualized and Non-Virtualized Network Architectures.
- Nancy, Sinan, mplementing SHA-1 and ECDSA in Vehicular Ad-Hoc Network using NS-3.I
- Algarni, Abdullah, Parental Control Application for Multi-User on Android Platforms.
- Raman, Vivek, Real-time Package Monitoring System using RFID and GPS Technologies.
2012
- . Alharbi, T., Emergency Communication for Deaf and Hard of Hearing.
- Jafferi, J., Implementation of Security Encryption and comparing Performance evaluation of Ad Hoc On Demand Distance Vector and Dynamic Source Routing Protocols using OPNET.
- Alharbi, T., An Assistive Communication Device for the Deaf and Hard of Hearing in the event of Emergency Evacuations.
- Alghamdi, K.,Bluetooth Security Lock for Android Smart Phone Platform.
- Sun, Y. , A Smartphone Application of Emergency Siren Detection for Vehicle Drivers with Hearing Disabilities..
- Madhavan, S., WiMax Communications for Neighbor Area Networks.
- Thummala, K., Performance of Storage Technologies: A Comparison Study.
2011
- Patil, M., Effect of Real Video Streaming over Virtual MANET Environment
- Alenizi, A., Emergency Communication for Deaf/Hard of Hearing.
Capstone/Thesis Committee Member: (Finished)
2021
- Rajashruthi Rajashekar (C), “Correlation Between Tweet Clusters and Cultural Hotspots in New York State”.
- Shreya Thacker (C) “Application of Borrower’s Credit Capacity”.
- Ralph Thelusma (C), “Understanding Contributing Factors to Poor Alphanumeric Password Safeguarding Practices”
- Sarah Andrew (C), “Designing for Mobile Authentication Situational Impairments Caused by COVID-19 Preventions”.
- Sreecharan Vangala (C), “Movie Recommendation System using Machine Learning Techniques.”
2020
- Palak Kurani (C), “Sentiment Classification of Smartphone Review by Considering Two Sides of Each Review”.
- Nikhil Nair (C), “Traffic Violation Analysis for Assessment of Insurance Risk Pools.”
2019
- Nikhil Nair (C), “Traffic Violation Analysis for Assessment of Insurance Risk Pools.”
2017
- Sindhura Meka (C), “ERP for Small Businesses.”
- Abdualziz Aliohani (C), “Increasing Cloud Availability and Integrity with an Onsite, Lightweight, Temporary Infrastructure and Database Replication.”
- Mithun Shriyan (C), “Improving Autonomous Systems Security for BGP Networks.”
- Jahed Iqbal (C), “Evaluate MDM Monioring and Applied Security”.
2016
- Pedro Montero (C): Gpon Implementation & Deployment Case Study Flaws of Implementation & Deployment, Tricom Dominican Republic.
- Mohammed Alghanemi (C): BPCS Student E-Service.
- Martin Okelo (C): Open Source Adoption in Eastern Africa.
- Jonathan Waggoner (C): Android Metasploit Module Proposal.
- Luis Alberto Pena, Committee Member (C): Detection System for VoIP toll frauds.
2015
- Mia Foster (C): How Effective for Impleenting Locked Down IT Environment to Secure the Business.
- Mostafa Alaqsm (C): The benefits of implementing RLES in Jazan University.
- Jeremy Schiefer (C): Using AWS as a Second Site.
- Marwan Alkhoder (C): Development of a blood donation network application.
- Saeed Alghamdi (C): Oneline Evaluation App for Planning and Development.
- Chirag Bharat Shah (C): System Operations Engineering Dashboard.
2014
- Assis Ngolo (C): Federated Identity Management in e-Government.
- Rini Raj Pulari (C): Deploy and Manage WMWare VCloud.
- Pooriva Aghaalitari (C): Development of a Vitrualization Systems Architecture Course for the Information Sciences and Technologies Dept.
- Aamir Ahmadhussian (C): Smart Home for Deaf People by Using iPhone Application with Bluetooth and Wireless Networks.
2013
- Carlos Gonzalez, Committee Member (C): Teaching System Administration in Amazon’s Elastic Cloud Computing Service.
2011
- Dautov, R. (C): Efficient Collision Resolution Protocol for Highly Populated Wireless Networks.
- Coleman, K. (C): A Low Cost Accountability, Communications, and Management System for Emergency First Responders using 3G and 4G Cellular Technologies.
2010
- Caminiti, J. (C): Service Level Agreements and Virtual Machine.